

Now that you know a little bit about me in the course, let's jump right into wire SharkĢ. I hold several industry standards certifications, including EEC councils certified at the Quacker. I have a bachelor's degree in information technology with focus and information security and a master's of science and information assurance cybersecurity. I'm currently working for a large I T firm in the Washington D. From that moment on, I wanted to learn everything there was about how hackers break into systems.

I got into the security field when I was in high school, was hosting a Web server from my room on some old hardware, and Hacker was able to get in and replace my home page. I've done everything from basic desktop and server support to certification and accreditation to pen testing and incident response. I have a little more than five years of experience in the eye teen security fields.

I'm Kyle Slauson and I'll be your instructor for this course. So let me give you a quick introduction about me. The computer should have at least two gigs of RAM and roughly five gigs of free hard drive space, and you'll need to download wire shark from wire shark dot org's. And the computer should have a wired network card. This course will include labs, so you'll need a computer with a modern operating system such as Windows seven, Mac OS X or Lennox. A security professionals who want to use wire shark to find malware and a PC Actors. The course was originally designed for I T professionals looking to use wire shark to monitor their networks as well. We'll go over how wire shark works, how to install this software and how to capture network traffic. This course will cover basics with wire shark. This course will help you learn how to use wire shark, an open source tool to capture and allies network traffic. Instructor Introduction: thank you for taking my course and wire Shark Network analysis.
